A Multi-Tiered Framework for Insider Threat Prevention

被引:18
作者
Alsowail, Rakan A. [1 ]
Al-Shehari, Taher [1 ]
机构
[1] King Saud Univ, Riyadh 11362, Saudi Arabia
关键词
insider threat prevention; multi-tiered approach; information security; data privacy; ACCESS-CONTROL; INFORMATION;
D O I
10.3390/electronics10091005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and business secrets, etc. Currently, the competition between organizations is significantly higher than before, which triggers sensitive organizations to spend an excessive volume of their budget to keep their assets secured from potential threats. Insider threats are more dangerous than external ones, as insiders have a legitimate access to their organization's assets. Thus, previous approaches focused on some individual factors to address insider threat problems (e.g., technical profiling), but a broader integrative perspective is needed. In this paper, we propose a unified framework that incorporates various factors of the insider threat context (technical, psychological, behavioral and cognitive). The framework is based on a multi-tiered approach that encompasses pre, in and post-countermeasures to address insider threats in an all-encompassing perspective. It considers multiple factors that surround the lifespan of insiders' employment, from the pre-joining of insiders to an organization until after they leave. The framework is utilized on real-world insider threat cases. It is also compared with previous work to highlight how our framework extends and complements the existing frameworks. The real value of our framework is that it brings together the various aspects of insider threat problems based on real-world cases and relevant literature. This can therefore act as a platform for general understanding of insider threat problems, and pave the way to model a holistic insider threat prevention system.
引用
收藏
页数:29
相关论文
共 87 条
[1]   A Tripwire Grammar for Insider Threat Detection [J].
Agrafiotis, Ioannis ;
Erola, Arnau ;
Goldsmith, Michael ;
Creese, Sadie .
MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, :105-108
[2]  
Al-Shehari Taher, 2014, International Journal of Computer Theory and Engineering, V6, P57, DOI 10.7763/IJCTE.2014.V6.837
[3]   An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks [J].
Al-Shehari, Taher ;
Zhioua, Sami .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (04) :1917-1931
[4]  
Ali G, 2008, 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, P168
[5]   Micromovement Behavior as an Intention Detection Measurement for Preventing Insider Threats [J].
Almehmadi, Abdulaziz .
IEEE ACCESS, 2018, 6 :40626-40637
[6]   On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC) [J].
Almehmadi, Abdulaziz ;
El-Khatib, Khalil .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :373-384
[7]   Empirical Detection Techniques of Insider Threat Incidents [J].
Alsowail, Rakan A. ;
Al-Shehari, Taher .
IEEE ACCESS, 2020, 8 :78385-78402
[8]   A knowledge-base model for insider threat prediction [J].
Althebyan, Qutaibah ;
Panda, Brajendra .
2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, :239-+
[9]  
[Anonymous], 2009, P CONGRESO IBEROAMER
[10]  
[Anonymous], 2008, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications